Sciweavers

6318 search results - page 72 / 1264
» Data Leakage Detection
Sort
View
IFIP
2010
Springer
15 years 2 months ago
Labeled VoIP Data-Set for Intrusion Detection Evaluation
Abstract. VoIP has become a major application of multimedia communications over IP. Many initiatives around the world focus on the detection of attacks against VoIP services and in...
Mohamed Nassar, Radu State, Olivier Festor
PKC
2010
Springer
148views Cryptology» more  PKC 2010»
15 years 8 months ago
On the Feasibility of Consistent Computations
In many practical settings, participants are willing to deviate from the protocol only if they remain undetected. Aumann and Lindell introduced a concept of covert adversaries to f...
Sven Laur, Helger Lipmaa
ASPDAC
2008
ACM
83views Hardware» more  ASPDAC 2008»
15 years 6 months ago
Run-time power gating of on-chip routers using look-ahead routing
Since on-chip routers in Network-on-Chips play a key role in on-chip communication between cores, they should be always preparing for packet injections even if a part of cores are ...
Hiroki Matsutani, Michihiro Koibuchi, Hideharu Ama...
CCR
2008
122views more  CCR 2008»
15 years 4 months ago
Cyclops: the AS-level connectivity observatory
In this paper we present Cyclops, a system that collects and displays information of AS-level connectivity extracted from looking glasses, route-servers and BGP tables and updates...
Ying-Ju Chi, Ricardo V. Oliveira, Lixia Zhang
TASLP
2008
64views more  TASLP 2008»
15 years 4 months ago
Improved A Posteriori Speech Presence Probability Estimation Based on a Likelihood Ratio With Fixed Priors
Abstract--In this contribution we present an improved estimator for the speech presence probability at each time-frequency point in the short-time Fourier-transform domain. In cont...
Timo Gerkmann, Colin Breithaupt, Rainer Martin